Yes, you can host sites for your friends on your Web Hosting account,
as long as you are not charging them money for hosting.
However, if any of your friends need direct access to the databases or
cPanel functions, they will need your cPanel login information. If you
chose to get a Reseller account, then each friend will have their own
cPanel. This is really a much better way to host multiple sites that
do not have the same owner.
Remember, shared Web Hosting accounts may not resell their host...

Attention developers! We fully support the usage of Git [1] on all
Shared, Reseller, VPS, and Dedicated servers.
For Shared and Reseller clients (with the exception of resold clients
under your Reseller package), you will need to fill out the SSH Access
Request [2] form before we can allow Git over SSH (we do not yet
support git:// on Shared/Reseller servers).
Once you do this, we will reply with the port information for access
to SSH, and the Git configuration you'll need to setup a re...

Yes, emails on the server count towards your storage limit. This is
one reason we recommend not storing e-mail on the server. Once you
download and read your mail, you should ensure that your e-mail client
deletes the mail from the server.
In the configuration settings for your e-mail client, make sure that
you do not have the option selected to "Leave mail on server" if you
do not wish to store e-mail on the server.

We offer TLS/SSL support on port 21, passive but not required.
FileZilla offers great support for this. Hit Ctrl+S in FileZilla,
click "New Site" and select FTPES - FTP over explicit TLS/SSL
Just use a "Normal" login, with your regular cPanel username and
password.

\N\N500 ERRORS & 403 ERRORS\N\N
This section will cover 500 errors and some of their causes.
General Causes
These are some of the reasons for getting these errors. 1. You have
not uploaded the files in the /cgi-bin/ in ASCII mode. 2. You have not
set the correct permissions on the the files in the /cgi-bin/ (all
should be CHMOD to 755)
Plesk Control Panel - Suexec Related Errors
If you are installing on a PLESK server and in a SUB-DIRECTORY, you
may get 500 errors or 403 errors. bello...

To point to your newly setup server or account you will need to
adjust your host file. (This is required to inspect your website
before changing the DNS of your domain to ensure the migration is
complete)
HOST FILE:
The hosts file contains lines of text consisting of an IP address in
the first text field followed by one or more host names. Each field is
separated by white space - tabs are often preferred for historical
reasons, but spaces are also used. Comment lines may be included; th...

Click here to view a video tutorial on how to create an addon domain.
[1]
STEP 1: To access the Addon Domains tool, click on the corresponding
icon located on the main screen of your cPanel interface.
STEP 2: Enter the name of the addon domain in the blank field next to
New Domain Name.
STEP 3: Enter the name of the directory which contains the subdomain
that the addon domain will point to in the blank field next to
Subdomain/FTP Username: (This directory will be the location for the...

To obtain a ClientExec license please fill out the following form:
https://www.pacifichost.com/requests/billing-system.shtml [1]
Once the license is provisioned, you can download and install
ClientExec on the domain you requested be licensed.
NOTE: We do not provide installation or general support for
ClientExec. Like you, we are only users of the software ourselves. To
obtain support regarding ClientExec, you can either purchase a support
plan with the developers directly (http://www.clientex...

Having your web site's security breached is never a fun thing to wake
up and find in the morning. It can be a pain to deal with, so with
that in mind, here are some helpful tips and suggestions on the steps
you should take to get your web site back to normal. If you can
provide a URL that is hacked or a snippet of the hacker code, we can
do a scan for you to get a list of files that are hacked. This may
help if you choose to manually edit the hacked files to remove the
code or want to know how i...

Our servers are setup to protect themselves if they perceive a threat
by blocking the IP. There are many things which can trigger a block on
your server including:
* Entering the wrong username or password multiple times within 5
minutes when logging into the control panel, email, or a password
protected area on the website.
* Opening too many connections to the server at one time. For FTP,
we recommend setting you FTP program to open no more than 2-3
connections at a time. For email, ...